| Version | Status |
|---|---|
| 0.1.x | Supported |
Older pre-1.0 releases are not supported. Security fixes for 0.1.x ship as
patch releases (0.1.1, 0.1.2, …) and are announced on the GitHub release
page.
Please report security issues privately rather than in a public GitHub issue.
Send a report to: skyforce77@users.noreply.github.com
Include in your report:
- A description of the vulnerability and its impact.
- Steps to reproduce (ideally a minimal Go snippet or failing test).
- The commit SHA or release version that is affected.
- Any mitigations you have already identified.
We aim to acknowledge receipt within 72 hours and to share a remediation plan within 7 days. Expect a coordinated disclosure window of up to 90 days for non-critical issues; actively exploited vulnerabilities are disclosed faster.
In scope:
pkg/libraries and their public API.cmd/tinyagentsctlbehavior.- Default wire format in
internal/wireandinternal/proto.
Out of scope:
- Issues in third-party LLM providers, gossip libraries, or Go standard library — report those upstream.
- Operational misconfiguration (running untrusted nodes on a public network,
missing TLS at the operator layer, etc.) — see
docs/clustering.mdfor the supported threat model.
None at time of writing. govulncheck ./... reports No vulnerabilities
found on the 0.1.x line. CI runs govulncheck on every push and
surfaces findings without gating releases, so newly-published advisories
are visible in workflow logs.
Research conducted in good faith against tinyagents — following this policy, avoiding data exfiltration, and limiting disruption to running services — is welcome. We will not pursue legal action against researchers who comply.